Bitdefender Client Security, 25-49u, 2Y, GOV, Cross, DEU CL5680200B Fiche De Données

Codes de produits
CL5680200B
Page de 2
IT’S YOUR BUSINESS. DEFEND IT.
CLIENT SECURITY DATASHEET
BITDEFENDER
CLIENT
SECURITY
THE FOUNDATION OF BUSINESS SECURITY
The security requirements for any new or existing company – no matter how large or 
small - should be the same. While protecting your company’s intellectual property and 
securing customer data are good business practices, the impact of any virus outbreak 
greatly affects the company’s operational effi ciency and can incur lost productivity 
from the workforce.  This loss of productivity can cripple a small company and at best, 
hamper the company’s growth.
ANTIVIRUS IS NOT ENOUGH
Threats are constantly evolving to circumvent the security controls your organization 
puts in place. While antivirus is the foundation of a good security policy, it is no longer 
the only answer to protecting your workforce from malicious threats. Threats that cause 
signifi cant business disruption can include:
Viruses:  Transmitted by infecting executable fi les, hidden inside of 
compressed archives or as macros within legitimate documents. Virus 
payloads include deleting fi les, encrypting data, wiping the hard disk, etc. 
Adware/Spyware: Almost as disruptive and dangerous as a virus, spyware 
can be diffi cult to identify and hard to remove. Personal and corporate data 
leakage is a key concern, in addition to deteriorating workstation 
performance, installing additional software and redirecting browser activity. 
Badly infected systems may require a complete system reinstall, wasting 
hours of IT time and resources.
Worms:  A self replicating program that uses the network to propagate, 
slowing down networks and infecting systems by leveraging system and 
application vulnerabilities. Payloads can include the deletion or encryption of 
fi les, emailing out documents, installing backdoors, zombies and Trojans. 
Trojans and Root Kits: Trojans and Root Kits appear to be legitimate 
programs but are designed to allow remote access to a computer system. 
Once a Trojan or Root Kit has been installed, it is possible for an attacker to 
access the system remotely and often can leads to data theft. Detecting and 
preventing these types of threats manually can be time consuming and often 
lead to a complete system reinstall if improperly removed.
Email Spam and Phishing: Unsolicited commercial advertisements 
distributed via email are more than just an annoyance.  Spam consumes too 
much of peoples’ personal time if not managed properly. Some Spam or 
phishing attacks may also include malware as attachments - leading to 
internal compromise if executed – or links to websites requesting personal 
information. Phishing uses similar techniques but directs the user to a 
seemingly legitimate website in order to harvest personal information, such 
as credit card or bank account information or dropping keyloggers onto the 
system that can harvest sensitive company information. 
The impact of malware can be a severe disruption to everyone in the organization - 
however, it is the IT department that feels the after-effects the most. IT administrators 
that have dealt with the removal of a quickly propagating worm or virus that has 
infected a large number of systems knows that it is a long, time consuming task. 
Unfortunately, that task must take precedence over other IT projects to limit data loss 
and restore workforce effi ciency as quickly as possible. 
KEY FEATURES AND BENEFITS
 
Award winning virus detection, 
cleaning and quarantine of viruses, 
spyware/adware, Trojans 
and rootkits
 
 Allows fl exible scheduling of on-
demand or immediate execution 
scans for up-to-date
infection assessments
 
 Optimized scanning using fi le 
fi ngerprinting for each user session 
and re-scans them upon new 
session creation, an update, or on 
infection of the system
 
 Quarantine’s infected or suspected 
fi les for to minimize infections and 
later safe analysis
 
 Policy-based  confi guration
and management
 
 Personal fi rewall protection for 
remote and roaming users
 
 System level spam protection with 
constantly updated whitelists/
blacklists and Bayesian learning 
engine to identify new spam that 
bypass traditional fi lters
 
 Customizable content fi ltering to 
identify sensitive information to 
minimize data leakage
 
 Reduce resource costs and 
overhead of managing multiple 
clients using a central
management console.
 
 Allows remote confi guration, 
auditing, installation, and application 
removal from any client or server 
system in the network